Role of Information Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Characteristics of useful info

A

1) Consistent
2) Understandable
3) Relevant and reliable
4) Timely
5) Comparable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advantages of digital capture

A

1) Cheap
2) Less human error, so better quality data
3) Rapid and easy capture of data
4) Improved security
5) Easy access
6) Easy to track and analyse, improving management and control of organisation
7) Environmental/Commercial benefits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disadvantages of digital capture

A

1) Can have high capital costs
2) Training costs
3) Systems may crash/become unavailable
4) Security of data concerns
5) Loss or inadequacy of tracking and analytical capability to meet user needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud Accounting

A

Accounting system accessed online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advantages cloud accounting

A

1) Access data anywhere
2) Access to real time info
3) Always using latest version of software
4) Can use analytical tools, within cloud accounting itself, or 3rd party tools
5) Can grant secure access to data to trusted 3rd parties
6) Can connect to bank accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud accounting disadvantages

A

1) Reliance on Internet and speed of transmitting data
2) Lack of customisation
3) Lack of data security
4) Locked in to one system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Finance function documentation

A

1) Inventory control
2) Costing info
3) Info for/from suppliers
4) Info for/from customers
5) budgetary info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cyber Attack

A

Attempt to destroy a comp. network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risks to data security

A

1) Physical intrusion leading to theft/damage of assets
2) Physical damage to hardware
3) Damage to data
4) Operational mistakes
5) Industrial espionage/fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is data security important

A

1) Protect commercially sensitive data
2) Helps support effective and efficient ways of working
3) Confidentiality of personal info
4) Confidentiality of customer/supplier info
5) Ensure reliability and completeness of data
6) Compliance with Rata Protection Act 2018, General Data Protection Regulation 2016, Computer Misuse Act 1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Consequences if data insecure

A

1) Loss of competitive advantage
2) Unauthorised access
3) Unauthorised ammendment
4) Corruption and/or unauthorised deletion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data security functions

A

1) Threat avoidance
2) Prevention
3) Deterrence
4) Detection
5) Recovery
6) Correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical security measures

A

1) Fire precautions
2) Data to protect against power surges
3) Appropriate positioning of hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you offset risks of fraud

A

1) Adequate controls over processing
2) Division of duties
3) Regular internal audit of controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password rules

A

1) Hard to guess
2) 6 characters, 1 non letter
3) Replace pre-set passwords ASAP
4) Keep password secret
5) Change regularly
6) Should be altered if may have been found out
7) No re-use of old passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stop viruses

A

1) anti-viruses
2) Control on external sw use
3) Use of only tested marked disks etc
4) Restricted access to disks etc
5) Use of passwords and ltd user numbers

17
Q

Stop cyber-attacks

A

1) Don’t dl content from unknown sources
2) Check authenticity of emails
3) Only enter info on sites known to be safe
4) Keep sw up to date
5) Install firewall and backup data
6) Controlled access to system